CVE & Exploit Intelligence Database

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

338,223 CVEs tracked 53,274 with exploits 4,730 exploited in wild 1,542 CISA KEV 3,929 Nuclei templates 37,826 vendors 42,555 researchers
2,435 results Clear all
CVE-2025-59237 8.8 HIGH EPSS 0.02
Microsoft Sharepoint Server - Insecure Deserialization
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
CWE-502 Oct 14, 2025
CVE-2025-11622 7.8 HIGH EPSS 0.00
Ivanti Endpoint Manager < 2024 - Insecure Deserialization
Insecure deserialization in Ivanti Endpoint Manager before version 2024 SU4 allows a local authenticated attacker to escalate their privileges.
CWE-502 Oct 13, 2025
CVE-2025-61505 6.5 MEDIUM 1 PoC Analysis EPSS 0.00
e107 CMS <2.3.3 - Deserialization
e107 CMS thru 2.3.3 are vulnerable to insecure deserialization in the `install.php` script. The script processes user-controlled input in the `previous_steps` POST parameter using `unserialize(base64_decode())` without validation, allowing attackers to craft malicious serialized data. This could lead to remote code execution, arbitrary file operations, or denial of service, depending on available PHP object gadgets in the codebase.
CWE-502 Oct 10, 2025
CVE-2025-35051 9.8 CRITICAL EPSS 0.00
Newforma Project Center - Insecure Deserialization
Newforma Project Center Server (NPCS) accepts serialized .NET data via the '/ProjectCenter.rem' endpoint on 9003/tcp, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. According to the recommended architecture, the vulnerable NPCS endpoint is only accessible on an internal network. To mitigate this vulnerability, restrict network access to NPCS.
CWE-502 Oct 09, 2025
CVE-2025-35050 9.8 CRITICAL EPSS 0.00
Newforma Project Center - Insecure Deserialization
Newforma Info Exchange (NIX) accepts serialized .NET data via the '/remoteweb/remote.rem' endpoint, allowing a remote, unauthenticated attacker to execute arbitrary code with 'NT AUTHORITY\NetworkService' privileges. The vulnerable endpoint is used by Newforma Project Center Server (NPCS), so a compromised NIX system can be used to attack an associated NPCS system. To mitigate this vulnerability, restrict network access to the '/remoteweb/remote.rem' endpoint, for example using the IIS URL Rewrite Module.
CWE-502 Oct 09, 2025
CVE-2025-60834 6.5 MEDIUM 1 Writeup EPSS 0.00
uzy-ssm-mall <v1.1.0 - Code Injection
A fastjson deserialization vulnerability in uzy-ssm-mall v1.1.0 allows attackers to execute arbitrary code via supplying a crafted input.
CWE-502 Oct 08, 2025
CVE-2025-60830 6.5 MEDIUM 1 Writeup EPSS 0.00
redragon-erp v1.0 - Deserialization
redragon-erp v1.0 was discovered to contain a Shiro deserialization vulnerability caused by the default Shiro key.
CWE-502 Oct 08, 2025
CVE-2025-60828 6.5 MEDIUM 1 Writeup EPSS 0.00
WukongCRM-9.0-JAVA - Code Injection
WukongCRM-9.0-JAVA was discovered to contain a fastjson deserialization vulnerability via the /OaExamine/setOaExamine interface.
CWE-502 Oct 08, 2025
CVE-2025-11346 6.3 MEDIUM EPSS 0.00
ILIAS <8.23/9.13/10.1 - Deserialization
A vulnerability has been found in ILIAS up to 8.23/9.13/10.1. This affects the function unserialize of the component Base64 Decoding Handler. Such manipulation of the argument f_settings leads to deserialization. It is possible to launch the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 is able to mitigate this issue. It is advisable to upgrade the affected component.
CWE-502 Oct 06, 2025
CVE-2025-11345 5.5 MEDIUM EPSS 0.00
ILIAS <8.23/9.13/10.1 - Deserialization
A flaw has been found in ILIAS up to 8.23/9.13/10.1. Affected by this issue is the function unserialize of the component Test Import. This manipulation causes deserialization. It is possible to initiate the attack remotely. Upgrading to version 8.24, 9.14 and 10.2 can resolve this issue. Upgrading the affected component is advised.
CWE-502 Oct 06, 2025
CVE-2025-10363 EPSS 0.01
Topal Finanzbuchhaltung <11.2.12.00 - RCE
Deserialization of Untrusted Data vulnerability in Topal Solutions AG Topal Finanzbuchhaltung on Windows allows Remote Code Execution.This issue affects at least Topal Finanzbuchhaltung: 10.1.5.20 and is fixed in version 11.2.12.00
CWE-502 Oct 06, 2025
CVE-2025-61765 6.4 MEDIUM 1 PoC Analysis EPSS 0.00
Pypi Python-socketio < 5.14.0 - Insecure Deserialization
python-socketio is a Python implementation of the Socket.IO realtime client and server. A remote code execution vulnerability in python-socketio versions prior to 5.14.0 allows attackers to execute arbitrary Python code through malicious pickle deserialization in multi-server deployments on which the attacker previously gained access to the message queue that the servers use for internal communications. When Socket.IO servers are configured to use a message queue backend such as Redis for inter-server communication, messages sent between the servers are encoded using the `pickle` Python module. When a server receives one of these messages through the message queue, it assumes it is trusted and immediately deserializes it. The vulnerability stems from deserialization of messages using Python's `pickle.loads()` function. Having previously obtained access to the message queue, the attacker can send a python-socketio server a crafted pickle payload that executes arbitrary code during deserialization via Python's `__reduce__` method. This vulnerability only affects deployments with a compromised message queue. The attack can lead to the attacker executing random code in the context of, and with the privileges of a Socket.IO server process. Single-server systems that do not use a message queue, and multi-server systems with a secure message queue are not vulnerable. In addition to making sure standard security practices are followed in the deployment of the message queue, users of the python-socketio package can upgrade to version 5.14.0 or newer, which remove the `pickle` module and use the much safer JSON encoding for inter-server messaging.
CWE-502 Oct 06, 2025
CVE-2023-49886 9.8 CRITICAL EPSS 0.01
IBM Transformation Extender Advanced - Insecure Deserialization
IBM Standards Processing Engine 10.0.1.10 could allow a remote attacker to execute arbitrary code on the system, caused by an unsafe java deserialization. By sending specially crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CWE-502 Oct 06, 2025
CVE-2025-11273 6.3 MEDIUM EPSS 0.00
LaChatterie Verger <1.2.10 - SSRF
A vulnerability was found in LaChatterie Verger up to 1.2.10. This impacts the function redirectToAuthorization of the file /src/main/services/mcp/oauth/provider.ts. The manipulation of the argument URL results in deserialization. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Oct 04, 2025
CVE-2025-61677 2.5 LOW 1 Writeup EPSS 0.00
DataChain <0.34.2 - Code Injection
DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.
CWE-502 Oct 03, 2025
CVE-2025-61622 9.8 CRITICAL 1 PoC Analysis EPSS 0.00
pyfory <0.12.2 - Code Injection
Deserialization of untrusted data in python in pyfory versions 0.12.0 through 0.12.2, or the legacy pyfury versions from 0.1.0 through 0.10.3: allows arbitrary code execution. An application is vulnerable if it reads pyfory serialized data from untrusted sources. An attacker can craft a data stream that selects pickle-fallback serializer during deserialization, leading to the execution of `pickle.loads`, which is vulnerable to remote code execution. Users are recommended to upgrade to pyfory version 0.12.3 or later, which has removed pickle fallback serializer and thus fixes this issue.
CWE-502 Oct 01, 2025
CVE-2025-11135 7.3 HIGH EPSS 0.00
pmTicket Project-Management-Software <2ef379da2075f4761a2c9029cf91d...
A vulnerability was detected in pmTicket Project-Management-Software up to 2ef379da2075f4761a2c9029cf91d073474e7486. The affected element is the function loadLanguage of the file classes/class.database.php of the component Cookie Handler. Performing manipulation of the argument user_id results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
CWE-502 Sep 29, 2025
CVE-2025-58384 10.0 CRITICAL EPSS 0.01
DOXENSE WATCHDOC <6.1.1.5332 - Code Injection
In DOXENSE WATCHDOC before 6.1.1.5332, Deserialization of Untrusted Data can lead to remote code execution through the .NET Remoting library in the Watchdoc administration interface.
CWE-502 Sep 26, 2025
CVE-2025-10975 6.3 MEDIUM EPSS 0.00
GuanxingLu <31abc0baf53ef8f5db666a1c882e1ea64def2997 - SSRF
A vulnerability was found in GuanxingLu vlarl up to 31abc0baf53ef8f5db666a1c882e1ea64def2997. This vulnerability affects the function experiments.robot.bridge.reasoning_server::run_reasoning_server of the file experiments/robot/bridge/reasoning_server.py of the component ZeroMQ. Performing manipulation of the argument Message results in deserialization. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.
CWE-502 Sep 25, 2025
CVE-2025-10974 6.3 MEDIUM EPSS 0.00
giantspatula SewKinect - Deserialization
A vulnerability has been found in giantspatula SewKinect up to 7fd963ceb3385af3706af02b8a128a13399dffb1. This affects the function pickle.loads of the file /calculate of the component Endpoint. Such manipulation of the argument body_parts/point_cloud leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.
CWE-502 Sep 25, 2025